It depends what authentication method you are using to "deploy". More detail is needed to actually answer here.
Are you talking about infrastructure deployment or application deployment. In either case the most likely issue is that whatever authentication solution you are using to "deploy" such as a service principle, most likely only has the correct role/permissions in the scope of you development environment. Which again I can only assume and guess based on the lack of information would be in a separate subscription to your production one.
Make sure that whatever authentication method you are using has the correct roles to perform the desired actions within the correct scope.